Security Control Sample Clauses
A Security Control clause establishes the requirements and standards for protecting sensitive information and systems within a contractual relationship. It typically outlines the specific security measures, such as encryption, access controls, or regular audits, that a party must implement to safeguard data and prevent unauthorized access. By clearly defining these obligations, the clause helps ensure that both parties maintain adequate security practices, thereby reducing the risk of data breaches and ensuring compliance with relevant laws or industry standards.
POPULAR SAMPLE Copied 2 times
Security Control. Contractor agrees to notify Boeing within 24 hours if for any reason a container marked “Material Requiring Destruction” is opened during transportation and/or handling prior to execution of actual destruction. Contractor agrees that if cartons marked “Material Requiring Destruction” are removed from a sealed container, they shall be stored in a secured area on its premises until material has been destroyed.
Security Control. The Passenger must submit to all security controls as required by the official government or airport authorities or at THE CARRIER’s request.
Security Control. Tenant is responsible for providing its contractor’s access to the Premises. The Tenant is fully responsible for the physical security of the leased premises and the contents therein throughout the construction period.
Security Control. Plant safety operation monitoring.
Security Control. The Passenger must submit to all security FRQWUROV DV UHTXLUHG E\ WKH RIILFLDO JRYHUQP request.
Security Control toyyibPay may take any action necessary to maintain the integrity and security of the toyyibPay Platform and Services, or to prevent harm to the User, the Customer, or other third- parties. The User is solely responsible for the security of any Data on their website, their servers, or that they are otherwise authorised to access or handle. The User must comply with applicable laws and rules when handling or maintaining user data and personal data and provide evidence of their compliance to toyyibPay upon request.
Security Control. 7.1.1. Before each use of the vehicle, the user must ensure the basic safety controls considered in this article: (I) the durability of the tires; (II) safe operation of all brakes and lights; and (III) the appropriate load carrying capacity of the scooter; (IV) sufficient battery level and (V) any signs of damage, unusual or excessive depreciation or other mechanical problems that can be clearly seen.
Security Control. When the Equipment has been installed according to this Agreement, the Supplier shall ensure that a Security Control is carried out together with SLL, with the assistance of an authorized inspector, according to the Time Schedule in order to control that the security, function and capacity of the installed Equipment complies with the conditions of this Agreement. A Security Control shall include
(i) any tests, scrutiny and testing that SLL deems adequate for this purpose (including tests with relevant media such as gas) and which in all essence complies with the standards generally applied within the industry and (ii) control of the technical documentation supplied by the Supplier. In due time before the Final Inspection, SLL shall produce minutes from the Security Control which – unless the contrary is shown –shall be deemed to correctly account for the execution and results of the Security Control. Unless otherwise agreed between the Parties, SLL shall bear the entire cost for the independent inspector.
Security Control. 1. The Independent Contractor shall provide a minimum of two (2) transporting agents for each pick-up, one being a female, if a female Offender is being transported.
2. The Independent Contractor shall provide security and control of the Offenders in accordance with the CCSO policies and procedures. Restraining devices are to be furnished by the Independent Contractor, but also must be approved by the CCSO.
3. The Independent Contractor shall only accept custody of Offenders from employees of the CCSO or authorized agents designated by the CCSO.
4. In the event of any unusual incident, emergency, or controversial situation which arises in the performance of their contract, the Independent Contractor shall immediately report such incidences to the CCSO. For the purpose of this subparagraph, “Unusual Incident, Emergency, or Controversial Incident” includes, but is not limited to, any acts of violence or attempted act of violence by an Offender or any other breach of security, any unusual delay in the transportation of an Offender, any medical treatment, and any refusal of law enforcement agencies to release an Offender to the Independent Contractor as authorized and directed by the CCSO.
Security Control. For the security and control mechanisms required from a service provider, the participants chose user authentication control, backup and confidentiality as the most important aspects. The list of answers from Fig. 17 is reproduced here for better readability:
1. User authentication control
2. Backup
3. Confidentiality
4. User Rights (authorization)
5. Integrity
6. Threat detection
7. Logs and audit trails
8. User authentication integration with current organization identity management system
9. Workload and data isolation